CN112818317A - Browsing process monitoring method, monitoring device and readable storage medium - Google Patents

Browsing process monitoring method, monitoring device and readable storage medium Download PDF

Info

Publication number
CN112818317A
CN112818317A CN202110416294.6A CN202110416294A CN112818317A CN 112818317 A CN112818317 A CN 112818317A CN 202110416294 A CN202110416294 A CN 202110416294A CN 112818317 A CN112818317 A CN 112818317A
Authority
CN
China
Prior art keywords
user
domain name
monitored
target
features
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110416294.6A
Other languages
Chinese (zh)
Inventor
白世杰
吴富章
赵宇航
王秋明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yuanjian Information Technology Co Ltd
Original Assignee
Beijing Yuanjian Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yuanjian Information Technology Co Ltd filed Critical Beijing Yuanjian Information Technology Co Ltd
Priority to CN202110416294.6A priority Critical patent/CN112818317A/en
Publication of CN112818317A publication Critical patent/CN112818317A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application provides a monitoring method, a monitoring device and a readable storage medium for a browsing process, wherein if a target website domain name input by a user to be monitored is a preset monitoring domain name, a login interface corresponding to the target website domain name is popped up; determining whether the user to be monitored has the access right of a detail interface corresponding to the target website domain name or not based on the initial facial features and the initial sound features of the user to be monitored; if the current browsing detail interface has the access right, acquiring real-time facial features and real-time sound features of a target user browsing the current detail interface in the browsing process of the detail interface; if the obtained real-time facial features belong to the same target user, determining whether the target user is a user to be monitored or not based on the real-time facial features and the real-time sound features; if yes, allowing the target user to continue browsing; and if not, jumping to a login interface. Therefore, the method can monitor related personnel browsing the interface in real time in the process of browsing the interface, and can effectively ensure the security of the confidential data.

Description

Browsing process monitoring method, monitoring device and readable storage medium
Technical Field
The present application relates to the field of monitoring technologies, and in particular, to a monitoring method, a monitoring device, and a readable storage medium for a browsing process.
Background
With the development of science and technology, when people need to frequently access the content of a specific website in a browser in daily life and work, privacy protection of users is needed, and especially for confidential information under the specific website, it is needed to ensure that only users with browsing permission check.
At present, the login authority of a user is usually authenticated according to a user name and a login password so as to ensure the browsing authority of the user; however, after the user completes the identity verification, the secret-related information cannot be prevented from being stolen and seen by other people, and further, the secret-related information is leaked, so that the economic loss is seriously brought to the user.
Disclosure of Invention
In view of this, an object of the present application is to provide a monitoring method, a monitoring device and a readable storage medium for a browsing process, which can perform real-time monitoring on a person browsing an interface in the browsing process of the interface, thereby effectively ensuring security of confidential data and being helpful for avoiding unnecessary economic loss.
The embodiment of the application provides a monitoring method for a browsing process, which comprises the following steps:
if the target website domain name input by the user to be monitored in the browser is a preset monitoring domain name, popping up a login interface corresponding to the target website domain name;
in the login interface, determining whether the user to be monitored has the access right of a detail interface corresponding to the target website domain name or not based on the initial facial features and the initial sound features of the user to be monitored;
if the user to be monitored has the access right, displaying the detail interface, and acquiring real-time facial features and real-time sound features of a target user who browses the detail interface currently in the browsing process of the detail interface;
if the obtained real-time facial features belong to the same target user, determining whether the target user is the user to be monitored or not based on the real-time facial features and the real-time sound features; if yes, allowing the target user to continue browsing the detail interface; and if not, jumping the detail interface to the login interface.
Further, if the target website domain name input by the user to be monitored in the browser is a preset monitoring domain name, popping up a login interface corresponding to the target website domain name, including:
acquiring a target website domain name input by the user to be monitored in a browser;
comparing whether the target website domain name is consistent with the preset monitoring domain name;
if the target website domain name is consistent with the target website domain name, popping up a login interface corresponding to the target website domain name;
and if not, displaying a browsing interface corresponding to the domain name of the target website.
Further, determining that the user to be monitored has the access right of the detail interface corresponding to the target website domain name through the following steps:
acquiring the registered facial features and the registered voice features of the user to be monitored;
determining whether a first facial similarity between the initial facial features and the registered facial features is greater than a facial similarity threshold and a first acoustic similarity between the initial acoustic features and the registered acoustic features is greater than an acoustic similarity threshold;
and if the first face similarity is greater than the face similarity threshold value and the first sound similarity is greater than the sound similarity threshold value, determining that the user to be monitored has the access right of the detail interface corresponding to the target website domain name.
Further, determining whether the target user is the user to be monitored by the following steps, including:
acquiring registered facial features, registered sound features, a first preset number of historical facial features and a second preset number of historical sound features of the user to be monitored;
calculating first similarities between the real-time facial features and the registered facial features and each historical facial feature, respectively, and calculating second similarities between the real-time voice features and the registered voice features and each historical voice feature, respectively;
determining a second facial similarity between the target user and the user to be monitored based on the plurality of first similarities obtained through calculation;
determining second sound similarity between the target user and the user to be monitored based on the plurality of second similarities obtained through calculation;
and if the second face similarity is greater than a face similarity threshold and the second sound similarity is greater than a sound similarity threshold, determining that the target user is the user to be monitored.
Further, the determining a second facial similarity between the target user and the user to be monitored based on the plurality of first similarities obtained through calculation includes:
calculating a similarity mean value of the plurality of first similarities;
and determining the similarity mean value as a second facial similarity between the target user and the user to be monitored.
Further, after the obtaining of the real-time facial features and real-time voice features of the target user currently browsing the detail interface, the monitoring method further includes:
and if the acquired real-time facial features belong to different target users or the real-time facial features are not acquired, determining that the target user is not the user to be monitored.
An embodiment of the present application further provides a monitoring device for a browsing process, where the monitoring device includes:
the interface popup module is used for popping up a login interface corresponding to a target website domain name if the target website domain name input by a user to be monitored in a browser is a preset monitoring domain name;
the authority verification module is used for determining whether the user to be monitored has the access authority of the detail interface corresponding to the target website domain name or not in the login interface based on the initial facial features and the initial sound features of the user to be monitored;
the real-time monitoring module is used for displaying the detail interface if the user to be monitored has the access right, and acquiring real-time facial features and real-time sound features of a target user who browses the detail interface currently in the browsing process of the detail interface;
the first verification module is used for determining whether the target user is the user to be monitored or not based on the real-time facial features and the real-time sound features if the obtained real-time facial features belong to the same target user; if yes, allowing the target user to continue browsing the detail interface; and if not, jumping the detail interface to the login interface.
Further, when the interface pop-up module is configured to pop up the login interface corresponding to the target website domain name if the target website domain name input by the user to be monitored in the browser is the preset monitoring domain name, the interface pop-up module is configured to:
acquiring a target website domain name input by the user to be monitored in a browser;
comparing whether the target website domain name is consistent with the preset monitoring domain name;
if the target website domain name is consistent with the target website domain name, popping up a login interface corresponding to the target website domain name;
and if not, displaying a browsing interface corresponding to the domain name of the target website.
Further, the permission verification module is configured to determine that the user to be monitored has the access permission of the detail interface corresponding to the target website domain name through the following steps:
acquiring the registered facial features and the registered voice features of the user to be monitored;
determining whether a first facial similarity between the initial facial features and the registered facial features is greater than a facial similarity threshold and a first acoustic similarity between the initial acoustic features and the registered acoustic features is greater than an acoustic similarity threshold;
and if the first face similarity is greater than the face similarity threshold value and the first sound similarity is greater than the sound similarity threshold value, determining that the user to be monitored has the access right of the detail interface corresponding to the target website domain name.
Further, the first verification module is configured to determine whether the target user is the user to be monitored by:
acquiring registered facial features, registered sound features, a first preset number of historical facial features and a second preset number of historical sound features of the user to be monitored;
calculating first similarities between the real-time facial features and the registered facial features and each historical facial feature, respectively, and calculating second similarities between the real-time voice features and the registered voice features and each historical voice feature, respectively;
determining a second facial similarity between the target user and the user to be monitored based on the plurality of first similarities obtained through calculation;
determining second sound similarity between the target user and the user to be monitored based on the plurality of second similarities obtained through calculation;
and if the second face similarity is greater than a face similarity threshold and the second sound similarity is greater than a sound similarity threshold, determining that the target user is the user to be monitored.
Further, when the first verification module is configured to determine a second facial similarity between the target user and the user to be monitored based on the plurality of calculated first similarities, the first verification module is configured to:
calculating a similarity mean value of the plurality of first similarities;
and determining the similarity mean value as a second facial similarity between the target user and the user to be monitored.
Further, the monitoring device further includes a second verification module, where the second verification module is configured to:
and if the acquired real-time facial features belong to different target users or the real-time facial features are not acquired, determining that the target user is not the user to be monitored, and skipping the detail interface to the login interface.
An embodiment of the present application further provides an electronic device, including: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory communicating via the bus when the electronic device is running, the machine-readable instructions being executable by the processor to perform the steps of the monitoring method of the browsing process as described above.
The embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the monitoring method for a browsing process as described above are performed.
According to the monitoring method, the monitoring device and the readable storage medium for the browsing process, if a target website domain name input by a user to be monitored in a browser is a preset monitoring domain name, a login interface corresponding to the target website domain name is popped up; in the login interface, determining whether the user to be monitored has the access right of a detail interface corresponding to the target website domain name or not based on the initial facial features and the initial sound features of the user to be monitored; if the user to be monitored has the access right, displaying the detail interface, and acquiring real-time facial features and real-time sound features of a target user who browses the detail interface currently in the browsing process of the detail interface; if the obtained real-time facial features belong to the same target user, determining whether the target user is the user to be monitored or not based on the real-time facial features and the real-time sound features; if yes, allowing the target user to continue browsing the detail interface; and if not, jumping the detail interface to the login interface. Therefore, the method can monitor related personnel browsing the interface in real time in the process of browsing the interface, can effectively ensure the security of the confidential data, and is beneficial to avoiding unnecessary economic loss.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a flowchart of a browsing process monitoring method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of domain name comparison process;
fig. 3 is a schematic structural diagram of a monitoring apparatus for a browsing process according to an embodiment of the present disclosure;
fig. 4 is a second schematic structural diagram of a monitoring apparatus for a browsing process according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. Every other embodiment that can be obtained by a person skilled in the art without making creative efforts based on the embodiments of the present application falls within the protection scope of the present application.
Research shows that at present, the login authority of a user is generally authenticated according to a user name and a login password so as to ensure the browsing authority of the user; however, after the user completes the identity verification, the secret-related information cannot be prevented from being stolen and seen by other people, and further, the secret-related information is leaked, so that the economic loss is seriously brought to the user.
Based on this, the embodiment of the application provides a monitoring method for a browsing process, which can monitor related personnel browsing an interface in real time in the process of browsing the interface, can effectively ensure the security of confidential data, and is helpful for avoiding unnecessary economic loss.
Referring to fig. 1, fig. 1 is a flowchart illustrating a monitoring method for a browsing process according to an embodiment of the present disclosure. As shown in fig. 1, a method for monitoring a browsing process provided in an embodiment of the present application includes:
s101, if the domain name of a target website input by a user to be monitored in a browser is a preset monitoring domain name, popping up a login interface corresponding to the domain name of the target website.
In the step, an address bar in a browser is monitored in real time, and when a user to be monitored inputs a target website domain name in the address bar of the browser, whether the target website domain name is a preset monitoring domain name is judged; if yes, popping up a login interface corresponding to the preset target website domain name.
Here, the preset monitoring domain name is set in advance, and may be one or more.
Further, as shown in fig. 2, fig. 2 is a schematic diagram of a domain name comparison process.
S201, acquiring a target website domain name input by the user to be monitored in a browser.
In the step, when a website input action of a user to be monitored in the browser is detected, a target website domain name input by the user to be monitored in the browser is obtained.
S202, comparing whether the domain name of the target website is consistent with the preset monitoring domain name.
In the step, the obtained target website domain name is compared with a preset monitoring domain name one by one to determine whether the obtained target website domain name is consistent with the preset monitoring domain name.
S203, if the domain names are consistent, popping up a login interface corresponding to the domain name of the target website.
In this step, if the target website domain name is consistent with the preset monitoring domain name, it is indicated that the detailed interface corresponding to the target website domain name belongs to a secret-related interface, and real-time monitoring is required, and at this time, a login interface corresponding to the target website domain name is popped up to verify the login identity of the user to be monitored.
And S204, if the domain names are not consistent, displaying a browsing interface corresponding to the domain name of the target website.
In this step, if the domain name of the target website is not consistent with the preset monitoring domain name, it is indicated that the detailed interface corresponding to the domain name of the target website does not belong to the classified interface, and the browsing interface corresponding to the domain name of the target website is directly displayed on the interface.
S102, in the login interface, determining whether the user to be monitored has the access right of the detail interface corresponding to the target website domain name or not based on the initial facial features and the initial sound features of the user to be monitored.
In the step, a user to be monitored is prompted to watch a screen in a login interface corresponding to a popup target website domain name, a facial image of the user to be monitored is collected through a camera device arranged on or connected with a terminal display device, and initial facial features are extracted from the facial image through a pre-trained facial feature extraction model.
Meanwhile, displaying voice verification information in a login interface corresponding to the domain name of the pop-up target website, prompting a user to read the voice verification information aloud, collecting aloud voice of the user to be monitored through a voice collecting device arranged on or connected with the terminal display equipment, and extracting initial voice characteristics from the aloud voice through a pre-trained voice characteristic extraction model.
And respectively converting the initial facial features and the initial sound features into initial facial feature vectors and initial sound feature vectors, comparing the initial facial feature vectors with the registered facial feature vectors corresponding to the registered facial features and the registered sound feature vectors corresponding to the registered sound features when the user to be monitored is registered, and determining whether the user to be monitored has the access right of the detail interface corresponding to the target website domain name.
Specifically, the user to be monitored is determined to have the access right through the following steps: acquiring the registered facial features and the registered voice features of the user to be monitored; determining whether a first facial similarity between the initial facial features and the registered facial features is greater than a facial similarity threshold and a first acoustic similarity between the initial acoustic features and the registered acoustic features is greater than an acoustic similarity threshold; and if the first face similarity is greater than the face similarity threshold value and the first sound similarity is greater than the sound similarity threshold value, determining that the user to be monitored has the access right of the detail interface corresponding to the target website domain name.
In the step, registration facial features and registration voice features provided when a user to be monitored registers are obtained, and whether first facial similarity between a registration facial feature vector corresponding to the registration facial features and an initial facial feature vector corresponding to the initial facial features is larger than a facial similarity threshold value is compared; meanwhile, whether a first sound similarity between the registration sound feature vector corresponding to the registration sound feature and the initial sound feature vector corresponding to the initial sound feature is larger than a sound similarity threshold value is compared.
And if the first face similarity is greater than the face similarity threshold value and the first sound similarity is greater than the sound similarity threshold value, determining that the user to be monitored has the access right of the detail interface corresponding to the target website domain name.
The face feature extraction model is obtained by training the constructed deep neural network through a plurality of sample faces; the human voice feature extraction model is obtained by training the constructed deep neural network through a plurality of sample human voices.
S103, if the user to be monitored has the access right, displaying the detail interface, and acquiring real-time facial features and real-time sound features of a target user browsing the detail interface currently in the browsing process of the detail interface.
In the step, if the condition that the user to be monitored has the access right of a detail interface is determined, the detail interface corresponding to the target website domain name is displayed on a terminal interface used by the user to be monitored, and the user to be monitored can browse the detail interface; and continuously acquiring real-time facial images and real-time sounds of a target user browsing the detail interface at present through the arranged camera device and the sound acquisition device in the browsing process of the detail interface.
Real-time facial features are extracted from the real-time facial images through a pre-trained facial feature extraction model, and real-time voice features are extracted from real-time voice through a pre-trained voice feature extraction model.
S104, if the obtained real-time facial features belong to the same target user, determining whether the target user is the user to be monitored or not based on the real-time facial features and the real-time sound features; if yes, allowing the target user to continue browsing the detail interface; and if not, jumping the detail interface to the login interface.
In this step, if a real-time facial feature is acquired and the acquired real-time facial feature is unique in the process of browsing the detail interface, whether a target user browsing the detail interface is a user to be monitored is determined based on the acquired real-time facial feature and the real-time sound feature.
If the target user is determined to be the user to be monitored, allowing the target user to continue browsing the detailed interface; and if the target user is determined not to be the user to be monitored, the target user is considered to be the user which is not logged in, a killing program is started to close the detail interface, the display of the target user is stopped, and the target user jumps to the login interface from the detail interface so as to log in by the target user.
Specifically, determining whether the target user is the user to be monitored through the following steps includes: acquiring registered facial features, registered sound features, a first preset number of historical facial features and a second preset number of historical sound features of the user to be monitored; calculating first similarities between the real-time facial features and the registered facial features and each historical facial feature, respectively, and calculating second similarities between the real-time voice features and the registered voice features and each historical voice feature, respectively; determining a second facial similarity between the target user and the user to be monitored based on the plurality of first similarities obtained through calculation; determining second sound similarity between the target user and the user to be monitored based on the plurality of second similarities obtained through calculation; and if the second face similarity is greater than a face similarity threshold and the second sound similarity is greater than a sound similarity threshold, determining that the target user is the user to be monitored.
In this step, the registered facial features and the registered sound features provided when the user to be monitored is registered are obtained, and before the current time, a first preset number of historical facial features of the user to be monitored, for example, the historical facial features passed through the previous 3 times of authentication, and a second preset number of historical sound features of the user to be monitored, for example, the historical sound features passed through the previous 5 times of authentication, are obtained.
Respectively calculating a first similarity between the real-time facial features and the registered facial features and each historical facial feature; and determining a second facial similarity between the target user and the user to be monitored based on the plurality of calculated first similarities.
Respectively calculating second similarity between the real-time sound features and the registered sound features and between the real-time sound features and the historical sound features; and determining second sound similarity between the target user and the user to be monitored based on the plurality of second similarities obtained through calculation.
Comparing the second face similarity to a face similarity threshold, and comparing the second sound similarity to a sound similarity threshold; and if the second face similarity is greater than the face similarity threshold and the second sound similarity is greater than the sound similarity threshold, determining the target user as the user to be monitored.
And if the second facial similarity is less than or equal to the facial similarity threshold and/or the second sound similarity is less than or equal to the sound similarity threshold, determining that the target user is not the user to be monitored, at the moment, considering that the target user is an unregistered user, starting a killing program to close the detail interface, stopping displaying the target user, and jumping to the login interface from the detail interface for the target user to log in.
Further, the determining a second facial similarity between the target user and the user to be monitored based on the plurality of first similarities obtained through calculation includes: calculating a similarity mean value of the plurality of first similarities; and determining the similarity mean value as a second facial similarity between the target user and the user to be monitored.
Calculating a similarity mean value of a plurality of first similarities, and determining the similarity mean value calculated based on the plurality of first similarities as a second facial similarity between the target user and the user to be monitored; similarly, a similarity mean value of the plurality of second similarities is calculated, and the similarity mean value calculated based on the plurality of second similarities is determined as a second sound similarity between the target user and the user to be monitored.
Further, after the obtaining of the real-time facial features and real-time voice features of the target user currently browsing the detail interface, the monitoring method further includes: and if the real-time facial features of a plurality of target users are acquired or the real-time facial features are not acquired, determining that the target users are not the users to be monitored, and skipping the detail interface to the login interface.
In the step, if the real-time facial features of a plurality of target users are obtained or the real-time facial features of the target users are not obtained in the process of continuously obtaining the real-time facial features and the real-time sound features of the target users browsing the detail interface at the current moment, the target users are not considered to be the users to be monitored, and at the moment, the target users jump to a login interface to perform login verification again.
According to the monitoring method for the browsing process, if a target website domain name input by a user to be monitored in a browser is a preset monitoring domain name, a login interface corresponding to the target website domain name is popped up; in the login interface, determining whether the user to be monitored has the access right of a detail interface corresponding to the target website domain name or not based on the initial facial features and the initial sound features of the user to be monitored; if the user to be monitored has the access right, displaying the detail interface, and acquiring real-time facial features and real-time sound features of a target user who browses the detail interface currently in the browsing process of the detail interface; if the obtained real-time facial features belong to the same target user, determining whether the target user is the user to be monitored or not based on the real-time facial features and the real-time sound features; if yes, allowing the target user to continue browsing the detail interface; and if not, jumping the detail interface to the login interface. Therefore, the method can monitor related personnel browsing the interface in real time in the process of browsing the interface, can effectively ensure the security of the confidential data, and is beneficial to avoiding unnecessary economic loss.
Referring to fig. 3 and 4, fig. 3 is a first schematic structural diagram of a monitoring device for a browsing process according to an embodiment of the present application, and fig. 4 is a second schematic structural diagram of the monitoring device for a browsing process according to the embodiment of the present application. As shown in fig. 3, the monitoring apparatus 300 includes:
the interface popping module 310 is configured to pop up a login interface corresponding to a target website domain name if the target website domain name input by a user to be monitored in a browser is a preset monitoring domain name;
the authority verification module 320 is configured to determine, in the login interface, whether the user to be monitored has an access authority of the detail interface corresponding to the target website domain name based on an initial facial feature and an initial sound feature of the user to be monitored;
the real-time monitoring module 330 is configured to display the detail interface if the user to be monitored has access right, and acquire a real-time facial feature and a real-time sound feature of a target user currently browsing the detail interface in a browsing process of the detail interface;
a first verification module 340, configured to determine, if the obtained real-time facial features belong to the same target user, whether the target user is the user to be monitored based on the real-time facial features and the real-time sound features; if yes, allowing the target user to continue browsing the detail interface; and if not, jumping the detail interface to the login interface.
Further, as shown in fig. 4, the monitoring apparatus 300 further includes a second verification module 350, where the second verification module 350 is configured to:
and if the acquired real-time facial features belong to different target users or the real-time facial features are not acquired, determining that the target user is not the user to be monitored, and skipping the detail interface to the login interface.
Further, when the interface pop-up module 310 is configured to pop up the login interface corresponding to the target website domain name if the target website domain name input by the user to be monitored in the browser is the preset monitoring domain name, the interface pop-up module 310 is configured to:
acquiring a target website domain name input by the user to be monitored in a browser;
comparing whether the target website domain name is consistent with the preset monitoring domain name;
if the target website domain name is consistent with the target website domain name, popping up a login interface corresponding to the target website domain name;
and if not, displaying a browsing interface corresponding to the domain name of the target website.
Further, the permission verification module 320 is configured to determine that the user to be monitored has the access permission of the detail interface corresponding to the target website domain name by:
acquiring the registered facial features and the registered voice features of the user to be monitored;
determining whether a first facial similarity between the initial facial features and the registered facial features is greater than a facial similarity threshold and a first acoustic similarity between the initial acoustic features and the registered acoustic features is greater than an acoustic similarity threshold;
and if the first face similarity is greater than the face similarity threshold value and the first sound similarity is greater than the sound similarity threshold value, determining that the user to be monitored has the access right of the detail interface corresponding to the target website domain name.
Further, the first verification module 340 is configured to determine whether the target user is the user to be monitored by the following steps, including:
acquiring registered facial features, registered sound features, a first preset number of historical facial features and a second preset number of historical sound features of the user to be monitored;
calculating first similarities between the real-time facial features and the registered facial features and each historical facial feature, respectively, and calculating second similarities between the real-time voice features and the registered voice features and each historical voice feature, respectively;
determining a second facial similarity between the target user and the user to be monitored based on the plurality of first similarities obtained through calculation;
determining second sound similarity between the target user and the user to be monitored based on the plurality of second similarities obtained through calculation;
and if the second face similarity is greater than a face similarity threshold and the second sound similarity is greater than a sound similarity threshold, determining that the target user is the user to be monitored.
Further, when the first verification module 340 is configured to determine a second facial similarity between the target user and the user to be monitored based on the plurality of calculated first similarities, the first verification module 340 is configured to:
calculating a similarity mean value of the plurality of first similarities;
and determining the similarity mean value as a second facial similarity between the target user and the user to be monitored.
According to the monitoring device for the browsing process, if a target website domain name input by a user to be monitored in a browser is a preset monitoring domain name, a login interface corresponding to the target website domain name is popped up; in the login interface, determining whether the user to be monitored has the access right of a detail interface corresponding to the target website domain name or not based on the initial facial features and the initial sound features of the user to be monitored; if the user to be monitored has the access right, displaying the detail interface, and acquiring real-time facial features and real-time sound features of a target user who browses the detail interface currently in the browsing process of the detail interface; if the obtained real-time facial features belong to the same target user, determining whether the target user is the user to be monitored or not based on the real-time facial features and the real-time sound features; if yes, allowing the target user to continue browsing the detail interface; and if not, jumping the detail interface to the login interface. Therefore, the method can monitor related personnel browsing the interface in real time in the process of browsing the interface, can effectively ensure the security of the confidential data, and is beneficial to avoiding unnecessary economic loss.
Referring to fig. 5, fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. As shown in fig. 5, the electronic device 500 includes a processor 510, a memory 520, and a bus 530.
The memory 520 stores machine-readable instructions executable by the processor 510, when the electronic device 500 runs, the processor 510 communicates with the memory 520 through the bus 530, and when the machine-readable instructions are executed by the processor 510, the steps of the monitoring method for the browsing process in the method embodiments shown in fig. 1 and fig. 2 may be executed.
An embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the browsing process monitoring method in the method embodiments shown in fig. 1 and fig. 2 may be executed.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer-readable storage medium executable by a processor. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used for illustrating the technical solutions of the present application, but not limiting the same, and the scope of the present application is not limited thereto, and although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the exemplary embodiments of the present application, and are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A monitoring method for a browsing process is characterized by comprising the following steps:
if the target website domain name input by the user to be monitored in the browser is a preset monitoring domain name, popping up a login interface corresponding to the target website domain name;
in the login interface, determining whether the user to be monitored has the access right of a detail interface corresponding to the target website domain name or not based on the initial facial features and the initial sound features of the user to be monitored;
if the user to be monitored has the access right, displaying the detail interface, and acquiring real-time facial features and real-time sound features of a target user who browses the detail interface currently in the browsing process of the detail interface;
if the obtained real-time facial features belong to the same target user, determining whether the target user is the user to be monitored or not based on the real-time facial features and the real-time sound features; if yes, allowing the target user to continue browsing the detail interface; and if not, jumping the detail interface to the login interface.
2. The monitoring method according to claim 1, wherein if the domain name of the target website input by the user to be monitored in the browser is a preset monitoring domain name, popping up a login interface corresponding to the domain name of the target website, comprising:
acquiring a target website domain name input by the user to be monitored in a browser;
comparing whether the target website domain name is consistent with the preset monitoring domain name;
if the target website domain name is consistent with the target website domain name, popping up a login interface corresponding to the target website domain name;
and if not, displaying a browsing interface corresponding to the domain name of the target website.
3. The monitoring method according to claim 1, wherein the access right of the user to be monitored for having the detail interface corresponding to the target website domain name is determined by the following steps:
acquiring the registered facial features and the registered voice features of the user to be monitored;
determining whether a first facial similarity between the initial facial features and the registered facial features is greater than a facial similarity threshold and a first acoustic similarity between the initial acoustic features and the registered acoustic features is greater than an acoustic similarity threshold;
and if the first face similarity is greater than the face similarity threshold value and the first sound similarity is greater than the sound similarity threshold value, determining that the user to be monitored has the access right of the detail interface corresponding to the target website domain name.
4. The monitoring method according to claim 1, wherein determining whether the target user is the user to be monitored by:
acquiring registered facial features, registered sound features, a first preset number of historical facial features and a second preset number of historical sound features of the user to be monitored;
calculating first similarities between the real-time facial features and the registered facial features and each historical facial feature, respectively, and calculating second similarities between the real-time voice features and the registered voice features and each historical voice feature, respectively;
determining a second facial similarity between the target user and the user to be monitored based on the plurality of first similarities obtained through calculation;
determining second sound similarity between the target user and the user to be monitored based on the plurality of second similarities obtained through calculation;
and if the second face similarity is greater than a face similarity threshold and the second sound similarity is greater than a sound similarity threshold, determining that the target user is the user to be monitored.
5. The monitoring method according to claim 4, wherein the determining a second facial similarity between the target user and the user to be monitored based on the calculated plurality of first similarities comprises:
calculating a similarity mean value of the plurality of first similarities;
and determining the similarity mean value as a second facial similarity between the target user and the user to be monitored.
6. The monitoring method according to claim 1, wherein after the obtaining of real-time facial features and real-time voice features of a target user currently browsing the detail interface, the monitoring method further comprises:
and if the acquired real-time facial features belong to different target users or the real-time facial features are not acquired, determining that the target user is not the user to be monitored, and skipping the detail interface to the login interface.
7. A browsing process monitoring apparatus, the monitoring apparatus comprising:
the interface popup module is used for popping up a login interface corresponding to a target website domain name if the target website domain name input by a user to be monitored in a browser is a preset monitoring domain name;
the authority verification module is used for determining whether the user to be monitored has the access authority of the detail interface corresponding to the target website domain name or not in the login interface based on the initial facial features and the initial sound features of the user to be monitored;
the real-time monitoring module is used for displaying the detail interface if the user to be monitored has the access right, and acquiring real-time facial features and real-time sound features of a target user who browses the detail interface currently in the browsing process of the detail interface;
the first verification module is used for determining whether the target user is the user to be monitored or not based on the real-time facial features and the real-time sound features if the obtained real-time facial features belong to the same target user; if yes, allowing the target user to continue browsing the detail interface; and if not, jumping the detail interface to the login interface.
8. The monitoring device according to claim 7, wherein the interface popup module is configured to, when the interface popup module is configured to popup a login interface corresponding to a target website domain name input by a user to be monitored in a browser if the target website domain name is a preset monitoring domain name,:
acquiring a target website domain name input by the user to be monitored in a browser;
comparing whether the target website domain name is consistent with the preset monitoring domain name;
if the target website domain name is consistent with the target website domain name, popping up a login interface corresponding to the target website domain name;
and if not, displaying a browsing interface corresponding to the domain name of the target website.
9. An electronic device, comprising: processor, memory and bus, said memory storing machine-readable instructions executable by said processor, said processor and said memory communicating via said bus when the electronic device is running, said machine-readable instructions being executable by said processor to perform the steps of the method of monitoring a browsing process according to any one of claims 1 to 6.
10. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, performs the steps of the method for monitoring a browsing process according to any one of claims 1 to 6.
CN202110416294.6A 2021-04-19 2021-04-19 Browsing process monitoring method, monitoring device and readable storage medium Pending CN112818317A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110416294.6A CN112818317A (en) 2021-04-19 2021-04-19 Browsing process monitoring method, monitoring device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110416294.6A CN112818317A (en) 2021-04-19 2021-04-19 Browsing process monitoring method, monitoring device and readable storage medium

Publications (1)

Publication Number Publication Date
CN112818317A true CN112818317A (en) 2021-05-18

Family

ID=75863661

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110416294.6A Pending CN112818317A (en) 2021-04-19 2021-04-19 Browsing process monitoring method, monitoring device and readable storage medium

Country Status (1)

Country Link
CN (1) CN112818317A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114221817A (en) * 2021-12-20 2022-03-22 北京知道创宇信息技术股份有限公司 Website defense method, device, server and storage medium
CN116975830A (en) * 2023-09-25 2023-10-31 中建八局第三建设有限公司 Bridge girder erection machine operator identity verification method, system and computer readable medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573456A (en) * 2014-12-29 2015-04-29 深圳市金立通信设备有限公司 Terminal interface control method
CN108537028A (en) * 2018-04-17 2018-09-14 西安电子科技大学 A kind of computer identity identifying system and method
CN108595931A (en) * 2018-04-25 2018-09-28 河南职业技术学院 Computer based page management method and page management device
CN108809992A (en) * 2018-06-15 2018-11-13 黄玉新 A kind of recognition of face verification system and its correlating method with goal systems
CN109522737A (en) * 2018-12-25 2019-03-26 上海碳蓝网络科技有限公司 Method and apparatus for determining resource access authority
CN109711129A (en) * 2018-12-15 2019-05-03 深圳壹账通智能科技有限公司 Login validation method, device, equipment and storage medium based on Application on Voiceprint Recognition
CN112149552A (en) * 2020-09-21 2020-12-29 三星电子(中国)研发中心 Intelligent monitoring method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573456A (en) * 2014-12-29 2015-04-29 深圳市金立通信设备有限公司 Terminal interface control method
CN108537028A (en) * 2018-04-17 2018-09-14 西安电子科技大学 A kind of computer identity identifying system and method
CN108595931A (en) * 2018-04-25 2018-09-28 河南职业技术学院 Computer based page management method and page management device
CN108809992A (en) * 2018-06-15 2018-11-13 黄玉新 A kind of recognition of face verification system and its correlating method with goal systems
CN109711129A (en) * 2018-12-15 2019-05-03 深圳壹账通智能科技有限公司 Login validation method, device, equipment and storage medium based on Application on Voiceprint Recognition
CN109522737A (en) * 2018-12-25 2019-03-26 上海碳蓝网络科技有限公司 Method and apparatus for determining resource access authority
CN112149552A (en) * 2020-09-21 2020-12-29 三星电子(中国)研发中心 Intelligent monitoring method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114221817A (en) * 2021-12-20 2022-03-22 北京知道创宇信息技术股份有限公司 Website defense method, device, server and storage medium
CN116975830A (en) * 2023-09-25 2023-10-31 中建八局第三建设有限公司 Bridge girder erection machine operator identity verification method, system and computer readable medium

Similar Documents

Publication Publication Date Title
CN111709004B (en) Identity authentication method and device, electronic equipment and readable storage medium
CN108683666B (en) Webpage identification method and device
CN109977639B (en) Identity authentication method and device and computer readable storage medium
CN106650350B (en) Identity authentication method and system
CN112818317A (en) Browsing process monitoring method, monitoring device and readable storage medium
CN111241883B (en) Method and device for preventing cheating of remote tested personnel
CN108052818B (en) Application starting method and device, storage medium and electronic equipment
CN109194689B (en) Abnormal behavior recognition method, device, server and storage medium
US9959401B2 (en) Automated password authentication
CN113257255B (en) Method and device for identifying forged voice, electronic equipment and storage medium
CN105224844B (en) Verification method, system and device
CN111818066A (en) Risk detection method and device
CN111611976A (en) Payment method and device based on face recognition
CN108234454B (en) Identity authentication method, server and client device
CN106789973B (en) Page security detection method and terminal equipment
CN110795715A (en) Data entry method, device and system and storage medium
CN110765939B (en) Identity recognition method and device, mobile terminal and storage medium
CN111104685B (en) Dynamic updating method and device for two-dimension code
JPWO2021214970A5 (en) INFORMATION PROCESSING APPARATUS, SYSTEM, FACE IMAGE UPDATE METHOD AND PROGRAM
Chen et al. Fraud analysis and detection for real-time messaging communications on social networks
CN108985035B (en) Control method and device for user operation authority, storage medium and electronic equipment
CN116561737A (en) Password validity detection method based on user behavior base line and related equipment thereof
CN112182520B (en) Identification method and device of illegal account number, readable medium and electronic equipment
CN111353139A (en) Continuous authentication method and device, electronic equipment and storage medium
EP3572961B1 (en) Method and system for continuous verification of user identity in an online service using multi-biometric data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210518

RJ01 Rejection of invention patent application after publication